DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OverFlow and UnderFlow causes in Solidity

OverFlow and UnderFlow causes in Solidity

Comments 1
1 min read
ShadowStrike: A Modern DDoS Testing Tool for Website Security
Cover image for ShadowStrike: A Modern DDoS Testing Tool for Website Security

ShadowStrike: A Modern DDoS Testing Tool for Website Security

6
Comments
2 min read
OverFlow and UnderFlow causes in Solidity

OverFlow and UnderFlow causes in Solidity

2
Comments
1 min read
Importando certificado SSL no cacerts, via KeyStore Explorer

Importando certificado SSL no cacerts, via KeyStore Explorer

1
Comments
1 min read
Combine AWS WAF with reactive infrastructure to block attackers (and don't go broke in the process)
Cover image for Combine AWS WAF with reactive infrastructure to block attackers (and don't go broke in the process)

Combine AWS WAF with reactive infrastructure to block attackers (and don't go broke in the process)

10
Comments 2
3 min read
New AWS WAF Feature: Top Insights Visualizations 02:37

New AWS WAF Feature: Top Insights Visualizations

3
Comments
1 min read
Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers
Cover image for Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers

Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers

9
Comments 1
2 min read
Understanding Firewalls In Cybersecurity
Cover image for Understanding Firewalls In Cybersecurity

Understanding Firewalls In Cybersecurity

4
Comments 1
3 min read
Rails GraphQL Auth - JWT, Email & Security
Cover image for Rails GraphQL Auth - JWT, Email & Security

Rails GraphQL Auth - JWT, Email & Security

Comments
4 min read
Bit flipping Attack on CBC: Change of the Ciphertext

Bit flipping Attack on CBC: Change of the Ciphertext

Comments
5 min read
AWS IAM: Access Control compared to how an International Airport works
Cover image for AWS IAM: Access Control compared to how an International Airport works

AWS IAM: Access Control compared to how an International Airport works

Comments
16 min read
Reset Password Windows Using Linux

Reset Password Windows Using Linux

Comments
2 min read
Segurança de servidores remotos

Segurança de servidores remotos

Comments
1 min read
Discover Java’s Top 10 Security Features
Cover image for Discover Java’s Top 10 Security Features

Discover Java’s Top 10 Security Features

5
Comments 2
4 min read
Mastering kubectl logs - A DevOps Engineer's Guide
Cover image for Mastering kubectl logs - A DevOps Engineer's Guide

Mastering kubectl logs - A DevOps Engineer's Guide

29
Comments 2
6 min read
OTP Authentication: The Passwordless Superhero of Your App! 🦸‍♂️✨
Cover image for OTP Authentication: The Passwordless Superhero of Your App! 🦸‍♂️✨

OTP Authentication: The Passwordless Superhero of Your App! 🦸‍♂️✨

Comments
5 min read
Permission-Based Authentication and Authorization in .NET, via Cookies
Cover image for Permission-Based Authentication and Authorization in .NET, via Cookies

Permission-Based Authentication and Authorization in .NET, via Cookies

Comments
13 min read
Password Hashing in Python

Password Hashing in Python

Comments 1
1 min read
⚠️ Modern Scamming Exposed
Cover image for ⚠️ Modern Scamming Exposed

⚠️ Modern Scamming Exposed

2
Comments
4 min read
Bit flipping Attack on CBC: Change of the IV

Bit flipping Attack on CBC: Change of the IV

1
Comments
3 min read
Why is GRC Important in 2025?
Cover image for Why is GRC Important in 2025?

Why is GRC Important in 2025?

1
Comments
3 min read
Secrets Management & Security: Hashicorp Vault

Secrets Management & Security: Hashicorp Vault

4
Comments
3 min read
Security news weekly round-up - 3rd January 2025
Cover image for Security news weekly round-up - 3rd January 2025

Security news weekly round-up - 3rd January 2025

1
Comments
3 min read
Why You Should Monitor Your App: Ensuring Uptime and Building Trust

Why You Should Monitor Your App: Ensuring Uptime and Building Trust

1
Comments
3 min read
Bulletproof JWT Authentication: Essential Security Patterns for Production Apps
Cover image for Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Comments
2 min read
loading...